Malware Analysis and Intrusion Detection in Cyber-Physical Systems
Many static and behavior-based malware detection methods have been developed to address malware and other cyber threats. Even though these cybersecurity systems offer good outcomes in a large dataset, they lack reliability and robustness in terms of detection. There is a critical need for relevant r...
Saved in:
Online Access: |
Full Text (via ProQuest) |
---|---|
Main Author: | |
Other Authors: | , , |
Format: | Electronic eBook |
Language: | English |
Published: |
Hershey :
IGI Global,
2023.
|
Table of Contents:
- Title Page
- Copyright Page
- Book Series
- Table of Contents
- Detailed Table of Contents
- Preface
- Chapter 1: Introduction to the Cyber-Security Landscape
- Chapter 2: Foundation of Malware Analysis and Detection
- Chapter 3: Malware Analysis and Classification
- Chapter 4: Wrapper-Based Feature Selection for Detecting the Lexical Phishing Websites Using Ensemble Learning Algorithms
- Chapter 5: Classification of Firewall Log Files Using Supervised Machine Learning Techniques
- Chapter 6: Discernment and Perusal of Software Vulnerability
- Chapter 7: Knowledge Repository on Cyber Security
- Chapter 8: Impact of Information Leakage and Conserving Digital Privacy
- Chapter 9: Intrusion Detection in Cyber Physical Systems Using Multichain
- Chapter 10: Malware Analysis With Machine Learning
- Chapter 11: Malware Forensics Analysis and Detection in Cyber Physical Systems
- Chapter 12: Malware Analysis and Its Mitigation Tools
- Chapter 13: Malware Forensics
- Chapter 14: Malware Detection Using Yara Rules in SIEM
- Chapter 15: Malware Mitigation Tools
- Chapter 16: The Future of Cyber Security Starts Today, Not Tomorrow
- Compilation of References
- About the Contributors
- Index